How to protect your business from ransomware

Ransomwarehas been a pervasive and dangerous threat to the business community for over five years. Seems like everywhere you turn, there’s another story about a new ransomware attack. And then, on Friday, May 12, the big one hit: WanaCrypt0r infected tens of thousands of endpoints in 150 countries, resulting in the largest ransomware outbreak in history. Unfortunately, this trend in cybercrime is not going away.

Now here’s the bright side: As dangerous as ransomware can be, it’s avoidable. So instead of closing your eyes and praying it all goes away soon, take a look at this infographic to see what you can do to protect your business from this ubiquitous threat.

May 9, 2012 - At Malwarebytes we are a bit obsessed with protecting our users, which causes us to approach our jobs from all sorts of different angles. One of my favorite aspects of this is how we tackle malware right at its source: the servers that deliver it. Our team works around the clock to identify and block...

May 24, 2012 - Back in 2009, I wrote about a telephony based scam that had gained momentum, and which sadly appears to have grown since then — invading other countries and scamming more victims. Since then, various other people, including my friends at Microsoft, have been investigating the companies involved, to try and both raise awareness and shut...

June 29, 2012 - This week, there is a lot of media hype over emails being sent to users of the Royal Bank of Scotland and NatWest because of severe IT issues making it impossible for users to access their accounts online. The emails offer users the ability to log-in to their accounts and provide a link to the...

July 3, 2012 - “Over the years, phishing attacks have changed, as with most things, and have been segmented into different groups of variants.” –Me If there is one thing you can say about cybercriminals, it’s that they are adaptive. As I mentioned last week, phishing attacks have evolved from just fake web pages and official looking emails to...

July 13, 2012 - Over the last few weeks I have described numerous methods of phishing attacks and a few examples what they do or may look like. In this final installment, I will shed some light on how phishing attacks are done and a few real world examples of techniques used by Phishing scammers. Finally, I will discuss...